Selasa, 06 Januari 2009

Internet security

When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an outside user.[1] Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.

Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.

Internet security professionals should be fluent in the four major aspects:

Contents

Details of routers

Network Address Translation (NAT) typically has the effect of preventing connections from being established inbound into a computer, whilst permitting connections out. For a small home network, software NAT can be used on the computer with the Internet connection, providing similar behaviour to a router and similar levels of security, but for a lower cost and lower complexity.

Firewalls

A firewall is a software program that has the ability to block any unauthorised ports on the computer. Firewalls are set up to record data of connection details.[2] There are three different types of firewalls. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system. Most home users use a software firewall. These types of firewalls can create a log file where it records all the connection details (including connection attempts) with the PC.


Anti-virus

Programs can be made to help your computer, but some users can also create programs with intentions of destroying the computers data by being deceptive. Such things like this are known as Trojan horses, worms, viruses and spyware.

  • Trojan horses are programs which pretend to do one thing, but in reality snoops out your personal data, or can end up damaging it. These types conceal their identity or true intentions and are usually quite hard to detect.
  • Worms are programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a result it has the ability to affect other programs on the computer.
  • Viruses are programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious side effects on a computers system.
  • Malware can be classified as trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, including spyware.

Software programs such as antivirus software are the most useful in protecting your computer from harmful viruses. These programs are used to detect and eliminate viruses. Anti-virus software can be purchased from any software vendor or downloaded off the internet. Care should be taken in the selection of anti-virus software, as some programs are not very affective in finding and eliminating viruses or malware. Also, when downloading anti-virus software from the Internet, one should be cautioned that some websites say they are providing protection from viruses with their software, but they are really trying to install malware on your computer by disguising it as something else.

Anti-spyware

There are two major kinds of threats in relation to spyware:

Spyware itself, is when so called “free” software is downloaded by the user. However this spyware conceals its real intentions. Spyware collects and relays data of the computer to the manufacturer, and continues to do so even if the program is never used.

Adware is simply those annoying pop-ups which constantly advertise things. These programs secretly install themselves on your computer files and are stuck there until the computer system is cleaned up.

Browser choice

Internet Explorer is the most popular and most widely used web browser in the world. As a result of this, it’s the prime target for phishing and other possible attacks. However, Mozilla Firefox is now too becoming a popular choice for online browsing, and may soon see more attacks specifically aimed at that browser.

See also

References

  1. ^ Riding the Internet Highway. Fisher, S. 1993
  2. ^ Privacy Protection and Computer Forensics. Caloyannides, M. 2004

External links

  • Internet Security Concepts - Presentations showing everything from how to secure a home system, to multi-factor authentication, encryption, social engineering, and advanced topics like XSS, IDS and SSL Certificate Hijacking.
  • Wireless Safety - Up to date info on the latest security threats, top news stories, and step by step tutorials on how to best protect yourself and family or organization.
  • Broadband Reports - FAQs and forums on internet security etc
  • PasswordMaker and PwdHash - Firefox & IE browser extensions that transparently converts a user's password into a domain-specific password.
  • FoxyProxy - Firefox proxy extension
  • Internet security - by JC & Goio (security programs).
  • The Internet and Data Security Guide - A to Z Glossary of terms
source:http://en.wikipedia.org/wiki/Internet_security
AddThis

Artikel Terkait:

0 komentar:

Grab this Widget ~ Blogger Accessories